CYBRARIAN® Public Computer Automation

Security

Security Model

Depending on usage, each organization may have different needs for security. Each level of security guards against different security issues.

Low Security
  • Prevent users from accessing the Windows Desktop
  • Disable the right mouse button
  • Disable the windows start button
  • Disable F3 Key
Medium Security
  • Protect against all Low Security features
  • Hides disk drives
  • Change the default user save directory
High Security
  • Protect against all Low and Medium Security
  • Hides the Recycle Bin and Network Places on the desktop
  • Disable Ctrl-Alt-Del
  • Disable Task Manager, Change Password, Lock Computer and Shutdown

User Authentication

CYBRARIAN® software is compatible with many ALS vendors. This is where you will choose your ALS vendor from the drop-down menu.

  • Configure Security Validation: After choosing your ALS vendor from the drop-down menu, click this button to setup your ALS vendor preferences.

  • Use Patron Manager: Select this box if you will be configuring a local database where patron field validation will be required.

  • Configure Patron Manager: Configure fields within your database to validate patrons.

  • Barcode Substitution: This feature will allow for privacy when printing reports. A patron's real barcode is masked by a substituted barcode in the log files.

User Login Application: Enter the full path of a program you wish to launch after the patron/user has logged in to the software here.

User Logout Application: Enter the full path of a program you wish to launch after the patron/user has logged out of the software here.

Proxy: You can configure the software to run with your Network Proxy Filter. The filter can be either an application or a service.